There can be no Mobile Enterprise without mobile security

Using mobile data carriers and mobile telecommunications is considered to carry the highest risk potential.

KPMG e-crime study, 2013

A sales manager working for a medical technology provider gets a phone call from a large clinic while on the road. The caller sets up a spontaneous meeting with the head of cardiology and chief buyer. Even though there is not much time, effective preparation is the key. The sales manager uses his tablet to access the Customer Relationship Management system and sketches of the prototype he plans to present. The technology gives him access to all the information he needs for the upcoming meeting from any location.

No mobile security? Easy prey for hackers

Unprotected mobile devices are always easy, attractive prey for professional hackers. Sometimes hackers target the movements of a manager, which could tip them off to M&A activities. Or they cause direct damage to a company by shutting down the online shop, for example. The impact that these scenarios can have is often underestimated. In the Global IT Security Risk Survey of 2013, Kaspersky reports that an average damage caused by a single serious attack cost a large company around EUR 480,000.

The extent to which the confidentiality of communication and data is protected varies from company to company and also depends on the roles of each employee and the level of confidentiality required for specific communication and data. Mobile security needs to be adjusted in each case accordingly. That is why a scaled portfolio makes sense for all types of security needs. Companies should be able to combine the portfolio modules to cover all potential attack targets including devices, apps, data transfer and back-end integration, usually SAP.

Maintaining mobile security with Mobile Device Management

Mobile Device Management (MDM) is indispensable for mobile security.MDMmakes sure that the managed devices are equipped and used in accordance with company security standards and governance policies. For example, the IT department can decide which apps are allowed to be used on company end-devices and remove any unwanted apps in case of doubt. MDM also helps companies manage the roll out of security features like anti-virus apps. MDM can even be used to remotely turn off and delete data from stolen or lost devices.

Additional solutions based on MDM can also be integrated as needed. An enterprise app store, for example, enables employees to download the applications they need to get the job done from a secure source. Apps that encrypt data before it is transferred make it impossible to spy on the communication between two devices.